Actually, we had considered that; the same adjustments to IKE can be used for 
any out-of-band, asynchronous but ongoing supplier of key material, with OTP 
keys via courier being the obvious example.  We decided when we started writing 
to focus on the QKD case, simply because we felt that the broader approach (a) 
was more likely to result in more discussion and a longer process within the 
WG, and (b) is less likely to be readily identified, picked up and used by QKD 
implementers.

When we initially began working on this, we also debated internally about the 
right level of information to share between IPsec gateways; it wasn’t initially 
obvious that we could/should do it without more QKD-specific support from IKE.  
Managing QKD is itself a big challenge.  We knew right away that we didn’t want 
to get into any physical-level discussions in the WG or include such 
negotations in the protocol, but e.g. QKD depends on an authenticated classical 
channel as it operates, to avoid a man in the middle attack, and it seemed 
plausible that we might want to tie that channel to IPsec.  In the end, we 
decided that keeping things as separate as possible was probably wise, and in 
fact our implementation turned out to be easiest that way.

So, if there is interest within the WG in broadening the language, we can do 
that, BUT:

* We would need a decision about how to handle the Transform Type Values and 
Payload Type Values, which is an IANA-relevant discussion; should all 
out-of-band key agreement methods share a single identifier, or should each one 
request a separate value?
* Although we have succeeded in keeping a clean interface for this particular 
case, we didn’t feel like we knew enough about the range of possible OOB key 
generation methods to state categorically that _they_ would not need additional 
support within the protocol.

                —Rod

On Oct 29, 2014, at 11:03 AM, <[email protected]> <[email protected]> 
wrote:

> I wonder if this should be worded more generically.  This is really about an 
> external key agreement mechanism.  QKD is one such mechanism, but it isn’t 
> clear to me that the machinery depends on this.
> Suppose, for example, that you distributed copies of one-time pad CDROMs to 
> both locations, and used the key ID as offset in the one-time-pad data.  This 
> is a completely different key agreement scheme but it would seem to fit just 
> as well.  The important point is that there is an external source of key 
> material, which has the (assumed) property that the key material is known to 
> the two endpoints of the IKE exchange, and to no other parties.
> 
> paul
> 
>> 
>> On Oct 27, 2014, at 2:13 PM, Rodney Van Meter <[email protected]> wrote:
>> 
>>> ...
>>> * We have just uploaded an -01 of the I-D we wrote, incorporating feedback 
>>> from several people, including Sean Turner, Sheila Frankel and Alan Mink.
>>>   
>>> http://datatracker.ietf.org/doc/draft-nagayama-ipsecme-ipsec-with-qkd/?include_text=1
>> 
> 

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to